Contact Us

|

Careers

|

Change Locale
close

Posts by Stephen Perciballi

Featured Article
From the experts | August 29, 2013 by Stephen Perciballi
Depending on your organization, BYOD means a lot of different things. BYOD can be a welcome change (employee retention, talent acquisition, employee satisfaction, productivity enhancement, lower IT costs, and potentially customer satisfaction) or a challenge (security, access/restriction of data, lost devices, etc). Regardless, the first step is knowing the who’s, what’s and where’s of your […]
Featured Article
Client Computing | August 7, 2013 by Stephen Perciballi
One of the perks working closely with the Blackberry team is getting our hands on new devices. I’ve been using the Z10 since November and have been really enjoying it. A review and video can be found here. Many of the people I’ve been working with have been anxiously awaiting the latest BlackBerry with full, […]
Featured Article
Not all tiers of storage are equal, especially when it comes to compliance. Optimize your storage architecture for regulatory obligations such as Sarbanes-Oxley, HIPAA and PCI, and you can recoup your compliance spend, make audits less painful and redeploy the savings to projects that have ROI potential. As with every aspect of your compliance efforts, […]
Featured Article
Client Computing | January 29, 2013 by Stephen Perciballi
The new BlackBerry 10 has arrived! Because Softchoice is part of the BlackBerry Technical Preview Program, we had exclusive access to the technology (handset and server software) before its official release, and I was able to spend a couple of weeks using the device. During that time, I had a chance to form some pretty strong […]
Featured Article
Client Computing | January 28, 2013 by Stephen Perciballi
Considering BlackBerry out of the game is like saying you won’t drink water out of your tap now knowing that Coke exists. If you are interested in securely managing data on your smartphones and tablets you should at least look at Blackberry Enterprise Service 10 (BES 10) and BlackBerry 10 (BB 10). While the competition is definitely popular, there […]
Featured Article
From the experts | September 6, 2012 by Stephen Perciballi
Dear Frank, The users in my organization have a variety of mobile devices, everything from Blackberries to iPhones to laptops and iPads. How do I ensure a secure, mobile experience for them no matter what device they are on? From, Mobily Challenged Dear Mobily Challenged, This is a common question that I get from almost […]
Featured Article
Lots of organizations are deploying Security Information and Event Management (SIEM) systems either to do their due diligence or because it’s part of a regulatory requirement. One of the misconceptions that typically is derived from marketing material is that you plug it in, turn it on, and voila, instant security. This couldn’t be further from […]
Featured Article
So many names. It always reminds me of the line from The Devil’s Advocate when Pacino says “Oh, I have so many names.” Security Information Management, Security Information and Event Management, SIM, SIEM, Log Management, Log Aggregation. If you really like to use buzz words you could call this Big Data for Security. This technology […]
Featured Article
Long gone is the perceived image of the malware perpetrator as an outcast-teenager sitting in his parent’s basement. Today’s internet thieves are more organized and technically savvy than ever. Years ago, security threats were simpler. There were Trojans, worms, and rootkits – and the differences between each were clear.  Now known collectively as “malware”, the differences between these […]
Featured Article
Wakefield Canada is the exclusive Canadian distributor of Castrol premium lubricants and Canada’s premier integrated manufacturer and distributor of Diesel Exhaust Fluid (DEF) under the brand name H2Blu. With a broad customer base across Canada, including retailers, warehouse distributors, quick lubes, fleet companies, new car dealers and Original Equipment Manufacturers, Wakefield prides itself on delivering […]
Featured Article
This article originally appeared on Stephen’s personal blog. You can visit it here. Don’t let the introduction scare you.This post is actually more appropriate for less technical readers who have had a computer failure and lost data. While on a recent business trip, the hard drive light on my laptop remained solid at all times. As […]
Featured Article
As 2011 comes to a close, Softchoice customers are evaluating the success and challenges from the present year, and planning for the year to come. The Softchoice Advisor sat down with our Manager of Category Marketing, Bryan Rusche, to understand the opportunity organizations should expect to encounter while continuing to mitigate risk and maximize efficiencies […]
Featured Article
This is the second in a series about how Softchoice implemented BYOC. We hope you find the series interesting and look forward to your comments and thoughts on your experiences. Building the team: You start with inviting a great marketing person to the team. OK, most BYOC teams don’t have someone like me blogging about the process, and […]
Featured Article
Networking is a word that for many causes trepidation and excitement at the same time, and I’m not necessarily talking only about networking equipment in IT, I’m also talking about human networking. We all know how nerve racking it can be to step into a room full of strangers with the goal of branching out […]
Featured Article
From the experts | December 16, 2011 by Stephen Perciballi
Want to save time and money on your Windows 7 deployment? Virtualize!  If you’re a stalwart IT decision maker who stuck by Windows XP for the last decade, you’re finally coming face to face with the reality of a Windows 7 world. And you’re probably asking yourself: so how do I make the move? For […]
Featured Article
From the experts | August 10, 2011 by Stephen Perciballi
It is extremely important to avoid the pitfall of an “all-or-nothing” approach when creating a desktop delivery strategy. You want to take the time to develop an in-depth view of diverse use-cases and chart out the best course of action for each one. This is the only way to ensure delivery of an optimal desktop […]
Featured Article
Previously we gave a high level view of securing a virtual environment. We talked about security gaps in the post and one of the biggest gaps is the lack of visibility between virtual machines on the same server. In a physical world, you have a network based Firewall and possibly a Unified Threat Management device securing the […]
Featured Article
We’ve been thinking about cloud a lot.  My goal is to help demystify security in a virtual environment. What are we doing with cloud computing? There are still servers, storage, networking, software, and security.  We’re really just implementing them in different ways. Rather than having file servers at every location we are centralizing our data […]
Featured Article
Client Computing | November 15, 2010 by Stephen Perciballi
Okay, you don’t like seatbelts. Too confining, you say. You drive carefully, right? Or, you only use your car for short trips around the block. Of course, that all may sound pretty persuasive until you have an accident – and your arguments, among other things, fly out the window. Which brings me to the ongoing […]